AU2001285441A1 - Hybrid privilege enforcement in a restricted execution environment - Google Patents
Hybrid privilege enforcement in a restricted execution environmentInfo
- Publication number
- AU2001285441A1 AU2001285441A1 AU2001285441A AU8544101A AU2001285441A1 AU 2001285441 A1 AU2001285441 A1 AU 2001285441A1 AU 2001285441 A AU2001285441 A AU 2001285441A AU 8544101 A AU8544101 A AU 8544101A AU 2001285441 A1 AU2001285441 A1 AU 2001285441A1
- Authority
- AU
- Australia
- Prior art keywords
- hybrid
- execution environment
- restricted execution
- privilege
- enforcement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/54—Link editing before load time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45529—Embedded in an application, e.g. JavaScript in a Web browser
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Multi Processors (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US22948100P | 2000-08-31 | 2000-08-31 | |
US60/229,481 | 2000-08-31 | ||
US67103400A | 2000-09-27 | 2000-09-27 | |
US09/671,034 | 2000-09-27 | ||
PCT/US2001/041732 WO2002019076A2 (en) | 2000-08-31 | 2001-08-15 | Hybrid privilege enforcement in a restricted execution environment |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001285441A1 true AU2001285441A1 (en) | 2002-03-13 |
Family
ID=26923333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001285441A Abandoned AU2001285441A1 (en) | 2000-08-31 | 2001-08-15 | Hybrid privilege enforcement in a restricted execution environment |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001285441A1 (en) |
WO (1) | WO2002019076A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8245270B2 (en) | 2005-09-01 | 2012-08-14 | Microsoft Corporation | Resource based dynamic security authorization |
US8112745B2 (en) * | 2006-03-22 | 2012-02-07 | Honeywell International Inc. | Apparatus and method for capabilities verification and restriction of managed applications in an execution environment |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US8839421B2 (en) | 2009-08-31 | 2014-09-16 | Blackberry Limited | System and method for controlling applications to mitigate the effects of malicious software |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5701463A (en) * | 1994-09-09 | 1997-12-23 | Cheyenne Advanced Technology Limited | Method of replacing the identity of a file with another as part of a file open request in a computer system |
US5987608A (en) * | 1997-05-13 | 1999-11-16 | Netscape Communications Corporation | Java security mechanism |
-
2001
- 2001-08-15 WO PCT/US2001/041732 patent/WO2002019076A2/en active Application Filing
- 2001-08-15 AU AU2001285441A patent/AU2001285441A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2002019076A2 (en) | 2002-03-07 |
WO2002019076A3 (en) | 2003-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001257566A1 (en) | Priority in a portable thread environment | |
AU2001243525A1 (en) | Battery | |
AU2001252918A1 (en) | Motor management program | |
AU2001297857A1 (en) | A micro-component for use in a light-emitting panel | |
AU2001245503A1 (en) | Grip-enhancing glove | |
AU2002210726A1 (en) | Software development | |
AU2001287064A1 (en) | Battery | |
AU2002234081A1 (en) | Rapid development in a distributed application environment | |
AU2002212381A1 (en) | Configuration management in a distributed platform | |
AU2001257430A1 (en) | Battery | |
AU2002213329A1 (en) | Battery | |
AU2001257429A1 (en) | Battery | |
AU2002229610A1 (en) | Auto-tunnelling in a heterogenous network | |
AU2001285441A1 (en) | Hybrid privilege enforcement in a restricted execution environment | |
EP1199759A3 (en) | Battery module | |
AU2002234035A1 (en) | Battery packaging construction | |
AU2002213328A1 (en) | Battery | |
AU2001283211A1 (en) | Platform independent project built and management tool | |
AU2001267264A1 (en) | The recycling battery | |
AU6069801A (en) | Fuel battery | |
AU6326700A (en) | Virtual model manipulation | |
AU3953100A (en) | Pollution boom | |
AU2001259010A1 (en) | A damper arrangement | |
AU2001220829A1 (en) | Supply-based management in a network environment | |
AU2001290176A1 (en) | Energy-absorbing members in a vehicle |